EconPapers    
Economics at your fingertips  
 

Quantum Automated Tools for Finding Impossible Differentials

Huiqin Xie (), Qiqing Xia, Ke Wang, Yanjun Li and Li Yang
Additional contact information
Huiqin Xie: Department of Cryptography Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070, China
Qiqing Xia: Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
Ke Wang: Department of Cryptography Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070, China
Yanjun Li: Information Industry Information Security Evaluation Center, The 15th Research Institute of China Electronics Technology Group Corporation, Beijing 100083, China
Li Yang: Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China

Mathematics, 2024, vol. 12, issue 16, 1-26

Abstract: Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent. For symmetric ciphers, the security analysis heavily relies on cryptanalysis tools. Thus, exploring the use of quantum algorithms in traditional cryptanalysis tools has garnered considerable attention. In this study, we utilize quantum algorithms to improve impossible differential attacks and design two quantum automated tools to search for impossible differentials. The proposed quantum algorithms exploit the idea of miss-in-the-middle and the properties of truncated differentials. We rigorously prove their validity and calculate the quantum resources required for their implementation. Compared to the existing classical automated cryptanalysis, the proposed quantum tools have the advantage of accurately characterizing S-boxes while only requiring polynomial complexity, and can take into consideration the impact of the key schedules in a single-key model.

Keywords: quantum cryptanalysis; symmetric cryptography; impossible differential attack; automated analysis (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/12/16/2598/pdf (application/pdf)
https://www.mdpi.com/2227-7390/12/16/2598/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:12:y:2024:i:16:p:2598-:d:1461970

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:12:y:2024:i:16:p:2598-:d:1461970